You may have heard about the free Wi-Fi hotspot that Microsoft pushed out in random Forbes magazines… This device comes with a T-Mobile GSM SIM card with the data service that lasts for only 15 days . I was curious as to what was making this tick, so I decided that it would be a fun experiment to lift the contents of this Linux OS off of the device.

The device has the following chips:

United-Tek H1602PR

Ralink RT5350F

Etron Tech EM63A165TS

These chips should be fairly obvious as to what purpose they serve, if not with a quick Google search.

The device has the following ports open with services started on by default: 80, 23, and 5820. That last one hosts a redirect site for a supposed login (or that’s what my phone seemed to think) in order to initiate the T-Mobile service? Maybe accessing that page triggers the “activation”. Please correct me either way.

Anyway, without further adieu, here are the steps I had to take in order to get the filesystem off of the device.

1. Plug device into computer via microusb and connect battery (this will keep the battery charged)
2. Wait for AP to startup, and connect to the SSID: Microsoft_Office365 with the password Office365
3. Visit 192.168.100.1:80 and login as admin/admin

4. Do whatever you want on this web interface regarding the router’s settings
4a. The FTP setting in here does not actually work, we need to do this via telnet (23)
5. telnet 192.168.100.1
6. Login as username: admin password: admin
7. cd /bin
8. vi new.conf
9. Paste this in vi:

Long time, no post. So, you want to anonymize not only your browsing experience but all of your applications as well without paying for a VPN… or wish to diversify what applications use what proxy? Well, look no further. Acquire the following:

Run Widecap, create a new proxy with the following: Server:Port: 127.0.0.1:9050 and select a Chain (e.g. Unused)

Select New Rule: name the rule, choose the Proxy chain to be used under the Chain tab (e.g. Unused), click OK

Drag and drop the PuTTY application into the main white box of “Programs” under View programs, select Proxify only this program, make sure the box is checked next to the application that you dragged in, and that the rule name has been applied

Have Vidalia running with a Tor node selected and running

After everything has been applied, run PuTTY

Enjoy.

This method works on all applications. Test it out on your own boxes and view the logs to see what IP appears as the connecting client.

A follower of Leetupload gave me a tip regarding an article he wrote for Select Real Security regarding the removal of malware on a win box. It covers all of the important points and provides links for any needed software. Check it out, here: Malware Removal Guide